Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Lowzones aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Lowzones Microsoft Trojan.MulDrop.3472
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.152
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.153
Trojan:Win32/Lowzones Microsoft Trojan.LowZones
Trojan:Win32/Lowzones Microsoft Trojan.Regger
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.740
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.735
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.899
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.192
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.92
Trojan:Win32/Lowzones Microsoft BackDoor.Vis
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.265
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.27716
Trojan:Win32/Lowzones Microsoft Trojan.StartPage.1707
Trojan:Win32/Lowzones Microsoft Trojan.StartPage.21254
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.61904
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.2751
Trojan:Win32/Lowzones Microsoft Trojan.StartPage.1113
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.110
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.111
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.125
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.150
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.140
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.7628
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.2036
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.15659
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.12560
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.764
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.587
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.27715
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.216
Trojan:Win32/Lowzones Microsoft Trojan.Inject.282
Trojan:Win32/Lowzones Microsoft Trojan.Gillo
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.227
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.217
Trojan:Win32/Lowzones Microsoft Trojan.DownLoader.23491
Trojan:Win32/Lowzones Microsoft Trojan.Click.4704
Trojan:Win32/Lowzones Microsoft Trojan.StartPage.20509
Trojan:Win32/Lowzones Microsoft Adware.Smiley
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.151
Trojan:Win32/Lowzones Microsoft Trojan.StartPage.1273
Trojan:Win32/Lowzones Microsoft Trojan.Click.1294
Trojan:Win32/Lowzones Microsoft Trojan.MulDrop.3323
Trojan:Win32/Lowzones Microsoft Trojan.Click.1176
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.163
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.161
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.166
Trojan:Win32/Lowzones Microsoft Trojan.LowZones.173
Trojan:Win32/Lowzones Microsoft Adware.Zango
Trojan:Win32/Lowzones Microsoft Adware.MediaMotor

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.